{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T14:35:50Z","timestamp":1774190150971,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,21]],"date-time":"2008-09-21T00:00:00Z","timestamp":1221955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["NSF-CNS 0626281"],"award-info":[{"award-number":["NSF-CNS 0626281"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,21]]},"DOI":"10.1145\/1409635.1409662","type":"proceedings-article","created":{"date-parts":[[2008,9,23]],"date-time":"2008-09-23T13:39:01Z","timestamp":1222177141000},"page":"192-201","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Reflecting on the invisible"],"prefix":"10.1145","author":[{"given":"Erika Shehan","family":"Poole","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"Christopher A.","family":"Le Dantec","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"James R.","family":"Eagan","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"W. Keith","family":"Edwards","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]}],"member":"320","published-online":{"date-parts":[[2008,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1203752"},{"key":"e_1_3_2_1_2_1","volume-title":"Toward a Theory of Sociotechnical Change","author":"Bijker W. E.","year":"1995","unstructured":"Bijker , W. E. Of Bicycles , Bakelites, and Bulbs : Toward a Theory of Sociotechnical Change . MIT Press , Cambridge, MA , 1995 . Bijker, W. E. Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change. MIT Press, Cambridge, MA, 1995."},{"key":"e_1_3_2_1_3_1","volume-title":"United States Patent","author":"Cardullo M. W.","year":"1973","unstructured":"Cardullo , M. W. and Parks , W. L . Transponder Apparatus and System . United States Patent , 1973 . Cardullo, M. W. and Parks, W. L. Transponder Apparatus and System. United States Patent, 1973."},{"key":"e_1_3_2_1_4_1","first-page":"3","volume":"11","author":"Chalmers M.","year":"2004","unstructured":"Chalmers , M. , Dieberger , A. , H\u00f6\u00f6k , K. and Rudstr\u00f6m , \u00c5. Social Navigation and Seamful Design. Cognitive Studies , 11 , 3 ( 2004 ), 1--11. Chalmers, M., Dieberger, A., H\u00f6\u00f6k, K. and Rudstr\u00f6m, \u00c5. Social Navigation and Seamful Design. Cognitive Studies, 11, 3 (2004), 1--11.","journal-title":"Social Navigation and Seamful Design. Cognitive Studies"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci1304_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_1_7_1","volume-title":"Doing Cultural Studies: The Story of the Sony Walkman","author":"Du Gay P.","year":"1997","unstructured":"Du Gay , P. , Hall , S. , Janes , L. , Mackay , H. and Negus , K . Doing Cultural Studies: The Story of the Sony Walkman . Sage Publications , 1997 . Du Gay, P., Hall, S., Janes, L., Mackay, H. and Negus, K. Doing Cultural Studies: The Story of the Sony Walkman. Sage Publications, 1997."},{"key":"e_1_3_2_1_8_1","first-page":"95","volume-title":"International Conference COSIT","author":"Egenhofer M. J.","year":"1995","unstructured":"Egenhofer , M. J. and Mark , D. M . Naive Geography. Spatial Information Theory---A Theoretical Basis for GIS , International Conference COSIT , 95 ( 1995 ), 1--15. Egenhofer, M. J. and Mark, D. M. Naive Geography. Spatial Information Theory---A Theoretical Basis for GIS, International Conference COSIT, 95 (1995), 1--15."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11526858_17"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506577"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/242485.242493"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124862"},{"key":"e_1_3_2_1_13_1","volume-title":"The Presentation of Self in Everyday Life","author":"Goffman I.","year":"1959","unstructured":"Goffman , I. The Presentation of Self in Everyday Life . Doubleday , Garden City , New York, USA, 1959 . Goffman, I. The Presentation of Self in Everyday Life. Doubleday, Garden City, New York, USA, 1959."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00043-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081992.1082023"},{"key":"e_1_3_2_1_16_1","volume-title":"Representation: Cultural Representations and Signifying Practices","author":"Hall S.","year":"1997","unstructured":"Hall , S. Representation: Cultural Representations and Signifying Practices . Sage Publications , 1997 . Hall, S. Representation: Cultural Representations and Signifying Practices. Sage Publications, 1997."},{"key":"e_1_3_2_1_17_1","volume-title":"The naive physics manifesto. Expert Systems in the Micro-Electronic Age","author":"Hayes P. J.","year":"1979","unstructured":"Hayes , P. J. The naive physics manifesto. Expert Systems in the Micro-Electronic Age ( 1979 ), 242--270. Hayes, P. J. The naive physics manifesto. Expert Systems in the Micro-Electronic Age (1979), 242--270."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2006.44"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"e_1_3_2_1_20_1","first-page":"75","volume":"10","author":"Kempton","year":"1986","unstructured":"Kempton , W. Two Theories of Home Heat Control. Cognitive Science , 10 ( 1986 ), 75 -- 90 . Kempton, W. Two Theories of Home Heat Control. Cognitive Science, 10 (1986), 75--90.","journal-title":"Two Theories of Home Heat Control. Cognitive Science"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.81"},{"key":"e_1_3_2_1_22_1","first-page":"273","volume":"2001","author":"Langheinrich","year":"2001","unstructured":"Langheinrich , M. Privacy By Design: Principles of Privacy-Aware Ubiquitous Systems Ubicomp 2001 , 2001 , 273 -- 291 . Langheinrich, M. Privacy By Design: Principles of Privacy-Aware Ubiquitous Systems Ubicomp 2001, 2001, 273--291.","journal-title":"Privacy By Design: Principles of Privacy-Aware Ubiquitous Systems Ubicomp"},{"key":"e_1_3_2_1_23_1","volume-title":"Springer","author":"Langheinrich M.","year":"2007","unstructured":"Langheinrich , M. RFID and Privacy. Security, Privacy, and Trust in Modern Data Management , Springer , New York , 2007 . Langheinrich, M. RFID and Privacy. Security, Privacy, and Trust in Modern Data Management, Springer, New York, 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240774"},{"key":"e_1_3_2_1_25_1","volume-title":"Risk Communication: A Mental Models Approach","author":"Morgan M. G.","year":"2002","unstructured":"Morgan , M. G. , Fischhoff , B. , Bostrom , A. and Atman , C. J . Risk Communication: A Mental Models Approach . Cambridge University Press , New York , 2002 . Morgan, M. G., Fischhoff, B., Bostrom, A. and Atman, C. J. Risk Communication: A Mental Models Approach. Cambridge University Press, New York, 2002."},{"key":"e_1_3_2_1_26_1","volume-title":"BBC News","author":"Morton S.","year":"2004","unstructured":"Morton , S. Barcelona Clubbers Get Chipped . BBC News , 2004 . Morton, S. Barcelona Clubbers Get Chipped. BBC News, 2004."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394445.1394446"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/196734.196745"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394445.1394494"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439307307687"},{"key":"e_1_3_2_1_31_1","first-page":"1","volume":"4","author":"Spiekermann S.","year":"2006","unstructured":"Spiekermann , S. and Pallas , F. Technology Paternalism: Wider Implications of Ubiquitous Computing. International Journal of Technology Assessment and Ethics of Science , 4 , 1 ( 2006 ), 1615--6609. Spiekermann, S. and Pallas, F. Technology Paternalism: Wider Implications of Ubiquitous Computing. International Journal of Technology Assessment and Ethics of Science, 4, 1 (2006), 1615--6609.","journal-title":"Technology Paternalism: Wider Implications of Ubiquitous Computing. International Journal of Technology Assessment and Ethics of Science"},{"key":"e_1_3_2_1_32_1","unstructured":"US Department of State. Electronic Passports. http:\/\/travel.state.gov\/passport\/  US Department of State. Electronic Passports. http:\/\/travel.state.gov\/passport\/"},{"key":"e_1_3_2_1_33_1","unstructured":"Verichip. http:\/\/www.verichipcorp.com.  Verichip. http:\/\/www.verichipcorp.com."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054999"},{"key":"e_1_3_2_1_35_1","first-page":"535","volume":"24","author":"Vosniadou S.","year":"1992","unstructured":"Vosniadou , S. and Brewer , W. F. Mental Models of the Earth: A Study of Conceptual Change in Childhood. Cognitive Psychology , 24 ( 1992 ), 535 -- 585 . Vosniadou, S. and Brewer, W. F. Mental Models of the Earth: A Study of Conceptual Change in Childhood. Cognitive Psychology, 24 (1992), 535--585.","journal-title":"Mental Models of the Earth: A Study of Conceptual Change in Childhood. Cognitive Psychology"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02474-0","volume-title":"RFID Explained: A Primer on Radio Frequency Identification Technologies. Morgan &amp","author":"Want R.","year":"2006","unstructured":"Want , R. RFID Explained: A Primer on Radio Frequency Identification Technologies. Morgan &amp ; Claypool , 2006 . Want, R. RFID Explained: A Primer on Radio Frequency Identification Technologies. Morgan &amp; Claypool, 2006."},{"key":"e_1_3_2_1_37_1","volume-title":"Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 8th USENIX Security Symposium","author":"Whitten A.","year":"1999","unstructured":"Whitten , A. and Tygar , J. D . Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 8th USENIX Security Symposium , 1999 . Whitten, A. and Tygar, J. D. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 8th USENIX Security Symposium, 1999."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.42.3.418"}],"event":{"name":"UbiComp08: The 10th International Conference on Ubiquitous Computing","location":"Seoul Korea","acronym":"UbiComp08","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGSOFT ACM Special Interest Group on Software Engineering","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 10th international conference on Ubiquitous computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409635.1409662","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1409635.1409662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:53Z","timestamp":1750253393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409635.1409662"}},"subtitle":["understanding end-user perceptions of ubiquitous computing"],"short-title":[],"issued":{"date-parts":[[2008,9,21]]},"references-count":38,"alternative-id":["10.1145\/1409635.1409662","10.1145\/1409635"],"URL":"https:\/\/doi.org\/10.1145\/1409635.1409662","relation":{},"subject":[],"published":{"date-parts":[[2008,9,21]]},"assertion":[{"value":"2008-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}